In that case, what would be best approach to achieve that all traffic is
forced though Tor and direct internet connection blocked, preferably
even if/when the system is breached?
On 2020-01-24 14:19, Andreas Krey wrote:
On Fri, 24 Jan 2020 01:12:10 +0000, Forst wrote:
Please don't make assumptions. If outgoing traffic is restricted,
which
ports are required for Tor to work as in outgoing traffic default
action
is drop?
Technically, all of them. A tor client connects to the OR-Ports of tor
relays, and they can be on any port. Many are on 443 and 9001, though.
But you can configure your node to only use specific ports outgoing,
see FirewallPorts and FascistFirewall in
https://2019.www.torproject.org/docs/tor-manual.html.en
So, even only of 443, 9001, and perhaps 80 is workable.
- Andreas
--
"Totally trivial. Famous last words."
From: Linus Torvalds <torvalds@*.org>
Date: Fri, 22 Jan 2010 07:29:21 -0800
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk